Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/WINDOWS/System32/DOC2839999.exe
Resource
win7-20231020-en
2 signatures
150 seconds
General
-
Target
Device/HarddiskVolume3/WINDOWS/System32/DOC2839999.exe
-
Size
1.1MB
-
MD5
f5dcd1b3fc9241c17a0c2c0d830511cd
-
SHA1
4e70ed1ac7b91dbdba4d97a1849b2a41e044bfa6
-
SHA256
04c518969d59a811b08599783636690d69bda989645b38d3c976d7ab01280125
-
SHA512
649400bf8b8b9357f7e6fa70a41f583e160896135113138cfd09aa349430f8cd260c53976a6d7a808c11019fade0e406758e43e16114bdbcfda4cdbb2d84d7fd
-
SSDEEP
24576:7HI5xwLKNhU6DsdWSRiB1haV/5BtIwj6Owx5sRsxAiTkG:DKwFbRJIwjPwx50niTkG
Malware Config
Extracted
Family
vidar
Version
52.6
Botnet
1204
C2
https://t.me/tg_dailylessons
https://busshi.moe/@olegf9844xx
Attributes
-
profile_id
1204
Signatures
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/3172-7-0x0000000000400000-0x0000000000461000-memory.dmp family_vidar behavioral2/memory/3172-8-0x0000000000400000-0x0000000000461000-memory.dmp family_vidar behavioral2/memory/3172-9-0x0000000000400000-0x0000000000461000-memory.dmp family_vidar behavioral2/memory/3172-11-0x0000000000400000-0x0000000000461000-memory.dmp family_vidar behavioral2/memory/3172-23-0x0000000000400000-0x0000000000461000-memory.dmp family_vidar -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3428 set thread context of 3172 3428 DOC2839999.exe 91 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe 3428 DOC2839999.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3428 DOC2839999.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3428 DOC2839999.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91 PID 3428 wrote to memory of 3172 3428 DOC2839999.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\WINDOWS\System32\DOC2839999.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\WINDOWS\System32\DOC2839999.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\ComputerDefaults.exe"C:\Windows\SysWOW64\ComputerDefaults.exe"2⤵PID:3172
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3768